Script for automatic setup of an IPsec VPN server, with both IPsec/L2TP and Cisco IPsec on CentOS/RHEL. Works on any dedicated server or virtual private server (VPS) except OpenVZ.
It can also be used as Amazon EC2 "user data" with the official CentOS AMIs.
» Related tutorial: IPsec VPN Server Auto Setup with Libreswan
Alternative VPN script for Ubuntu/Debian
↓ ↓ ↓ Scroll down for the script ↓ ↓ ↓
Copyright (C) 2015-2025 Lin Song
Based on the work of Thomas Sarlandie (Copyright 2012)
This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License
Attribution required: please include my name in any derivative and let me know how you have improved it!
| #!/bin/bash | |
| # | |
| # Script for automatic setup of an IPsec VPN server on CentOS/RHEL, Rocky Linux, | |
| # AlmaLinux and Oracle Linux | |
| # | |
| # DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC! | |
| # | |
| # The latest version of this script is available at: | |
| # https://github.com/hwdsl2/setup-ipsec-vpn | |
| # | |
| # Copyright (C) 2015-2025 Lin Song <[email protected]> | |
| # Based on the work of Thomas Sarlandie (Copyright 2012) | |
| # | |
| # This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 | |
| # Unported License: http://creativecommons.org/licenses/by-sa/3.0/ | |
| # | |
| # Attribution required: please include my name in any derivative and let me | |
| # know how you have improved it! | |
| # ===================================================== | |
| # Define your own values for these variables | |
| # - IPsec pre-shared key, VPN username and password | |
| # - All values MUST be placed inside 'single quotes' | |
| # - DO NOT use these special characters within values: \ " ' | |
| YOUR_IPSEC_PSK='' | |
| YOUR_USERNAME='' | |
| YOUR_PASSWORD='' | |
| # ===================================================== | |
| export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" | |
| SYS_DT=$(date +%F-%T | tr ':' '_') | |
| exiterr() { echo "Error: $1" >&2; exit 1; } | |
| exiterr2() { exiterr "'yum install' failed."; } | |
| conf_bk() { /bin/cp -f "$1" "$1.old-$SYS_DT" 2>/dev/null; } | |
| bigecho() { echo "## $1"; } | |
| check_ip() { | |
| IP_REGEX='^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$' | |
| printf '%s' "$1" | tr -d '\n' | grep -Eq "$IP_REGEX" | |
| } | |
| check_dns_name() { | |
| FQDN_REGEX='^([a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?\.)+[a-zA-Z]{2,}$' | |
| printf '%s' "$1" | tr -d '\n' | grep -Eq "$FQDN_REGEX" | |
| } | |
| check_root() { | |
| if [ "$(id -u)" != 0 ]; then | |
| exiterr "Script must be run as root. Try 'sudo bash $0'" | |
| fi | |
| } | |
| check_vz() { | |
| if [ -f /proc/user_beancounters ]; then | |
| exiterr "OpenVZ VPS is not supported." | |
| fi | |
| } | |
| check_lxc() { | |
| # shellcheck disable=SC2154 | |
| if [ "$container" = "lxc" ] && [ ! -e /dev/ppp ]; then | |
| cat 1>&2 <<'EOF' | |
| Error: /dev/ppp is missing. LXC containers require configuration. | |
| See: https://github.com/hwdsl2/setup-ipsec-vpn/issues/1014 | |
| EOF | |
| exit 1 | |
| fi | |
| } | |
| check_os() { | |
| rh_file="/etc/redhat-release" | |
| if [ -f "$rh_file" ]; then | |
| os_type=centos | |
| if grep -q "Red Hat" "$rh_file"; then | |
| os_type=rhel | |
| fi | |
| [ -f /etc/oracle-release ] && os_type=ol | |
| grep -qi rocky "$rh_file" && os_type=rocky | |
| grep -qi alma "$rh_file" && os_type=alma | |
| if grep -q "release 7" "$rh_file"; then | |
| os_ver=7 | |
| elif grep -q "release 8" "$rh_file"; then | |
| os_ver=8 | |
| grep -qi stream "$rh_file" && os_ver=8s | |
| elif grep -q "release 9" "$rh_file"; then | |
| os_ver=9 | |
| grep -qi stream "$rh_file" && os_ver=9s | |
| elif grep -q "release 10" "$rh_file"; then | |
| os_ver=10 | |
| grep -qi stream "$rh_file" && os_ver=10s | |
| else | |
| exiterr "This script only supports CentOS/RHEL 7-10." | |
| fi | |
| if [ "$os_type" = "centos" ] \ | |
| && { [ "$os_ver" = 7 ] || [ "$os_ver" = 8 ] || [ "$os_ver" = 8s ]; }; then | |
| exiterr "CentOS Linux $os_ver is EOL and not supported." | |
| fi | |
| else | |
| cat 1>&2 <<'EOF' | |
| Error: This script only supports one of the following OS: | |
| CentOS/RHEL, Rocky Linux, AlmaLinux or Oracle Linux | |
| EOF | |
| exit 1 | |
| fi | |
| } | |
| check_iface() { | |
| if ! command -v route >/dev/null 2>&1 && ! command -v ip >/dev/null 2>&1; then | |
| ( | |
| set -x | |
| yum -y -q install iproute >/dev/null || yum -y -q install iproute >/dev/null | |
| ) | |
| fi | |
| def_iface=$(route 2>/dev/null | grep -m 1 '^default' | grep -o '[^ ]*$') | |
| [ -z "$def_iface" ] && def_iface=$(ip -4 route list 0/0 2>/dev/null | grep -m 1 -Po '(?<=dev )(\S+)') | |
| def_state=$(cat "/sys/class/net/$def_iface/operstate" 2>/dev/null) | |
| if [ -n "$def_state" ] && [ "$def_state" != "down" ]; then | |
| case $def_iface in | |
| wl*) | |
| exiterr "Wireless interface '$def_iface' detected. DO NOT run this script on your PC or Mac!" | |
| ;; | |
| esac | |
| NET_IFACE="$def_iface" | |
| else | |
| eth0_state=$(cat "/sys/class/net/eth0/operstate" 2>/dev/null) | |
| if [ -z "$eth0_state" ] || [ "$eth0_state" = "down" ]; then | |
| exiterr "Could not detect the default network interface." | |
| fi | |
| NET_IFACE=eth0 | |
| fi | |
| } | |
| check_creds() { | |
| [ -n "$YOUR_IPSEC_PSK" ] && VPN_IPSEC_PSK="$YOUR_IPSEC_PSK" | |
| [ -n "$YOUR_USERNAME" ] && VPN_USER="$YOUR_USERNAME" | |
| [ -n "$YOUR_PASSWORD" ] && VPN_PASSWORD="$YOUR_PASSWORD" | |
| if [ -z "$VPN_IPSEC_PSK" ] && [ -z "$VPN_USER" ] && [ -z "$VPN_PASSWORD" ]; then | |
| bigecho "VPN credentials not set by user. Generating random PSK and password..." | |
| VPN_IPSEC_PSK=$(LC_CTYPE=C tr -dc 'A-HJ-NPR-Za-km-z2-9' </dev/urandom 2>/dev/null | head -c 20) | |
| VPN_USER=vpnuser | |
| VPN_PASSWORD=$(LC_CTYPE=C tr -dc 'A-HJ-NPR-Za-km-z2-9' </dev/urandom 2>/dev/null | head -c 16) | |
| fi | |
| if [ -z "$VPN_IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then | |
| exiterr "All VPN credentials must be specified. Edit the script and re-enter them." | |
| fi | |
| if printf '%s' "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" | LC_ALL=C grep -q '[^ -~]\+'; then | |
| exiterr "VPN credentials must not contain non-ASCII characters." | |
| fi | |
| case "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" in | |
| *[\\\"\']*) | |
| exiterr "VPN credentials must not contain these special characters: \\ \" '" | |
| ;; | |
| esac | |
| } | |
| check_dns() { | |
| if { [ -n "$VPN_DNS_SRV1" ] && ! check_ip "$VPN_DNS_SRV1"; } \ | |
| || { [ -n "$VPN_DNS_SRV2" ] && ! check_ip "$VPN_DNS_SRV2"; }; then | |
| exiterr "The DNS server specified is invalid." | |
| fi | |
| } | |
| check_server_dns() { | |
| if [ -n "$VPN_DNS_NAME" ] && ! check_dns_name "$VPN_DNS_NAME"; then | |
| exiterr "Invalid DNS name. 'VPN_DNS_NAME' must be a fully qualified domain name (FQDN)." | |
| fi | |
| } | |
| check_client_name() { | |
| if [ -n "$VPN_CLIENT_NAME" ]; then | |
| name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)" | |
| if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \ | |
| || case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then | |
| exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'." | |
| fi | |
| fi | |
| } | |
| check_subnets() { | |
| if [ -s /etc/ipsec.conf ] && grep -qs "hwdsl2 VPN script" /etc/sysctl.conf; then | |
| L2TP_NET=${VPN_L2TP_NET:-'192.168.42.0/24'} | |
| XAUTH_NET=${VPN_XAUTH_NET:-'192.168.43.0/24'} | |
| if ! grep -q "$L2TP_NET" /etc/ipsec.conf \ | |
| || ! grep -q "$XAUTH_NET" /etc/ipsec.conf; then | |
| echo "Error: The custom VPN subnets specified do not match initial install." >&2 | |
| echo " See Advanced usage -> Customize VPN subnets for more information." >&2 | |
| exit 1 | |
| fi | |
| fi | |
| } | |
| start_setup() { | |
| bigecho "VPN setup in progress... Please be patient." | |
| mkdir -p /opt/src | |
| cd /opt/src || exit 1 | |
| } | |
| install_setup_pkgs() { | |
| bigecho "Installing packages required for setup..." | |
| ( | |
| set -x | |
| yum -y -q install wget bind-utils openssl tar \ | |
| iptables iproute gawk grep sed net-tools >/dev/null \ | |
| || yum -y -q install wget bind-utils openssl tar \ | |
| iptables iproute gawk grep sed net-tools >/dev/null | |
| ) || exiterr2 | |
| } | |
| get_default_ip() { | |
| def_ip=$(ip -4 route get 1 | sed 's/ uid .*//' | awk '{print $NF;exit}' 2>/dev/null) | |
| if check_ip "$def_ip" \ | |
| && ! printf '%s' "$def_ip" | grep -Eq '^(10|127|172\.(1[6-9]|2[0-9]|3[0-1])|192\.168|169\.254)\.'; then | |
| public_ip="$def_ip" | |
| fi | |
| } | |
| detect_ip() { | |
| public_ip=${VPN_PUBLIC_IP:-''} | |
| check_ip "$public_ip" || get_default_ip | |
| check_ip "$public_ip" && return 0 | |
| bigecho "Trying to auto discover IP of this server..." | |
| check_ip "$public_ip" || public_ip=$(dig @resolver1.opendns.com -t A -4 myip.opendns.com +short) | |
| check_ip "$public_ip" || public_ip=$(wget -t 2 -T 10 -qO- http://ipv4.icanhazip.com) | |
| check_ip "$public_ip" || public_ip=$(wget -t 2 -T 10 -qO- http://ip1.dynupdate.no-ip.com) | |
| check_ip "$public_ip" || exiterr "Cannot detect this server's public IP. Define it as variable 'VPN_PUBLIC_IP' and re-run this script." | |
| } | |
| add_epel_repo() { | |
| bigecho "Adding the EPEL repository..." | |
| epel_url="https://dl.fedoraproject.org/pub/epel/epel-release-latest-$(rpm -E '%{rhel}').noarch.rpm" | |
| ( | |
| set -x | |
| yum -y -q install epel-release >/dev/null 2>&1 || yum -y -q install "$epel_url" >/dev/null | |
| ) || exiterr2 | |
| } | |
| install_vpn_pkgs_1() { | |
| bigecho "Installing packages required for the VPN..." | |
| erp="--enablerepo" | |
| rp1="$erp=epel" | |
| rp2="$erp=*server-*optional*" | |
| rp3="$erp=*releases-optional*" | |
| if [ "$os_type" = "ol" ]; then | |
| if [ "$os_ver" = 9 ]; then | |
| rp1="$erp=ol9_developer_EPEL" | |
| elif [ "$os_ver" = 8 ]; then | |
| rp1="$erp=ol8_developer_EPEL" | |
| else | |
| rp3="$erp=ol7_optional_latest" | |
| fi | |
| fi | |
| ( | |
| set -x | |
| yum -y -q install nss-devel nspr-devel pkgconfig pam-devel \ | |
| libcap-ng-devel libselinux-devel curl-devel nss-tools \ | |
| flex bison gcc make util-linux ppp >/dev/null | |
| ) || exiterr2 | |
| } | |
| install_vpn_pkgs_2() { | |
| ( | |
| set -x | |
| yum "$rp1" -y -q install xl2tpd >/dev/null 2>&1 | |
| ) || exiterr2 | |
| } | |
| install_vpn_pkgs_3() { | |
| use_nft=0 | |
| p1=systemd-devel | |
| p2=libevent-devel | |
| p3=fipscheck-devel | |
| p4=iptables-services | |
| if [ "$os_ver" = 7 ]; then | |
| ( | |
| set -x | |
| yum "$rp2" "$rp3" -y -q install $p1 $p2 $p3 $p4 >/dev/null | |
| ) || exiterr2 | |
| else | |
| ( | |
| set -x | |
| yum -y -q install $p1 $p2 >/dev/null | |
| ) || exiterr2 | |
| if [ "$os_ver" = 9 ] || [ "$os_ver" = 9s ] \ | |
| || [ "$os_ver" = 10 ] || [ "$os_ver" = 10s ] \ | |
| || systemctl is-active --quiet firewalld \ | |
| || systemctl is-active --quiet nftables \ | |
| || grep -qs "hwdsl2 VPN script" /etc/sysconfig/nftables.conf; then | |
| use_nft=1 | |
| p4=nftables | |
| fi | |
| ( | |
| set -x | |
| yum -y -q install $p4 >/dev/null | |
| ) || exiterr2 | |
| fi | |
| } | |
| create_f2b_config() { | |
| F2B_FILE=/etc/fail2ban/jail.local | |
| if [ ! -f "$F2B_FILE" ]; then | |
| bigecho "Creating basic Fail2Ban rules..." | |
| cat > "$F2B_FILE" <<'EOF' | |
| [ssh-iptables] | |
| enabled = true | |
| filter = sshd | |
| logpath = /var/log/secure | |
| EOF | |
| if [ "$use_nft" = 1 ]; then | |
| cat >> "$F2B_FILE" <<'EOF' | |
| port = ssh | |
| banaction = nftables-multiport[blocktype=drop] | |
| EOF | |
| else | |
| cat >> "$F2B_FILE" <<'EOF' | |
| action = iptables[name=SSH, port=ssh, protocol=tcp] | |
| EOF | |
| fi | |
| fi | |
| } | |
| install_fail2ban() { | |
| bigecho "Installing Fail2Ban to protect SSH..." | |
| ( | |
| set -x | |
| yum "$rp1" -y -q install fail2ban >/dev/null | |
| ) && create_f2b_config | |
| } | |
| link_scripts() { | |
| cd /opt/src || exit 1 | |
| /bin/mv -f ikev2setup.sh ikev2.sh | |
| /bin/mv -f add_vpn_user.sh addvpnuser.sh | |
| /bin/mv -f del_vpn_user.sh delvpnuser.sh | |
| echo "+ ikev2.sh addvpnuser.sh delvpnuser.sh" | |
| for sc in ikev2.sh addvpnuser.sh delvpnuser.sh; do | |
| [ -s "$sc" ] && chmod +x "$sc" && ln -s "/opt/src/$sc" /usr/bin 2>/dev/null | |
| done | |
| } | |
| get_helper_scripts() { | |
| bigecho "Downloading helper scripts..." | |
| base1="https://raw.githubusercontent.com/hwdsl2/setup-ipsec-vpn/master/extras" | |
| base2="https://gitlab.com/hwdsl2/setup-ipsec-vpn/-/raw/master/extras" | |
| sc1=ikev2setup.sh | |
| sc2=add_vpn_user.sh | |
| sc3=del_vpn_user.sh | |
| cd /opt/src || exit 1 | |
| /bin/rm -f "$sc1" "$sc2" "$sc3" | |
| if wget -t 3 -T 30 -q "$base1/$sc1" "$base1/$sc2" "$base1/$sc3"; then | |
| link_scripts | |
| else | |
| /bin/rm -f "$sc1" "$sc2" "$sc3" | |
| if wget -t 3 -T 30 -q "$base2/$sc1" "$base2/$sc2" "$base2/$sc3"; then | |
| link_scripts | |
| else | |
| echo "Warning: Could not download helper scripts." >&2 | |
| /bin/rm -f "$sc1" "$sc2" "$sc3" | |
| fi | |
| fi | |
| } | |
| get_swan_ver() { | |
| SWAN_VER=5.3 | |
| base_url="https://github.com/hwdsl2/vpn-extras/releases/download/v1.0.0" | |
| swan_ver_url="$base_url/v1-$os_type-$os_ver-swanver" | |
| swan_ver_latest=$(wget -t 2 -T 10 -qO- "$swan_ver_url" | head -n 1) | |
| [ -z "$swan_ver_latest" ] && swan_ver_latest=$(curl -m 10 -fsL "$swan_ver_url" 2>/dev/null | head -n 1) | |
| if printf '%s' "$swan_ver_latest" | grep -Eq '^([3-9]|[1-9][0-9]{1,2})(\.([0-9]|[1-9][0-9]{1,2})){1,2}$'; then | |
| SWAN_VER="$swan_ver_latest" | |
| fi | |
| if [ -n "$VPN_SWAN_VER" ]; then | |
| if ! printf '%s\n%s' "4.15" "$VPN_SWAN_VER" | sort -C -V \ | |
| || ! printf '%s\n%s' "$VPN_SWAN_VER" "$SWAN_VER" | sort -C -V; then | |
| cat 1>&2 <<EOF | |
| Error: Libreswan version '$VPN_SWAN_VER' is not supported. | |
| This script can install Libreswan 4.15+ or $SWAN_VER. | |
| EOF | |
| exit 1 | |
| else | |
| SWAN_VER="$VPN_SWAN_VER" | |
| fi | |
| fi | |
| } | |
| check_libreswan() { | |
| check_result=0 | |
| [ ! -d /etc/ipsec.d ] && { get_swan_ver; return 0; } | |
| ipsec_ver=$(/usr/local/sbin/ipsec --version 2>/dev/null) | |
| swan_ver_old=$(printf '%s' "$ipsec_ver" | sed -e 's/.*Libreswan U\?//' -e 's/\( (\|\/K\).*//') | |
| ipsec_bin="/usr/local/sbin/ipsec" | |
| if [ -n "$swan_ver_old" ] && printf '%s' "$ipsec_ver" | grep -qi 'libreswan' \ | |
| && [ "$(find "$ipsec_bin" -mmin -10080)" ]; then | |
| check_result=1 | |
| return 0 | |
| fi | |
| get_swan_ver | |
| if [ -s "$ipsec_bin" ] && [ "$swan_ver_old" = "$SWAN_VER" ]; then | |
| touch "$ipsec_bin" | |
| fi | |
| [ "$swan_ver_old" = "$SWAN_VER" ] && check_result=1 | |
| } | |
| get_libreswan() { | |
| if [ "$check_result" = 0 ]; then | |
| bigecho "Downloading Libreswan..." | |
| cd /opt/src || exit 1 | |
| swan_file="libreswan-$SWAN_VER.tar.gz" | |
| swan_url1="https://github.com/libreswan/libreswan/archive/v$SWAN_VER.tar.gz" | |
| swan_url2="https://download.libreswan.org/$swan_file" | |
| ( | |
| set -x | |
| wget -t 3 -T 30 -q -O "$swan_file" "$swan_url1" || wget -t 3 -T 30 -q -O "$swan_file" "$swan_url2" | |
| ) || exit 1 | |
| /bin/rm -rf "/opt/src/libreswan-$SWAN_VER" | |
| tar xzf "$swan_file" && /bin/rm -f "$swan_file" | |
| else | |
| bigecho "Libreswan $swan_ver_old is already installed, skipping..." | |
| fi | |
| } | |
| install_libreswan() { | |
| if [ "$check_result" = 0 ]; then | |
| bigecho "Compiling and installing Libreswan, please wait..." | |
| cd "libreswan-$SWAN_VER" || exit 1 | |
| cat > Makefile.inc.local <<'EOF' | |
| WERROR_CFLAGS=-w -s | |
| USE_DNSSEC=false | |
| USE_DH2=true | |
| USE_NSS_KDF=false | |
| USE_LINUX_AUDIT=false | |
| USE_SECCOMP=false | |
| FINALNSSDIR=/etc/ipsec.d | |
| NSSDIR=/etc/ipsec.d | |
| EOF | |
| if ! grep -qs IFLA_XFRM_LINK /usr/include/linux/if_link.h; then | |
| echo "USE_XFRM_INTERFACE_IFLA_HEADER=true" >> Makefile.inc.local | |
| fi | |
| NPROCS=$(grep -c ^processor /proc/cpuinfo) | |
| [ -z "$NPROCS" ] && NPROCS=1 | |
| ( | |
| set -x | |
| make "-j$((NPROCS+1))" -s base >/dev/null 2>&1 && make -s install-base >/dev/null 2>&1 | |
| ) | |
| cd /opt/src || exit 1 | |
| /bin/rm -rf "/opt/src/libreswan-$SWAN_VER" | |
| if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER" \ | |
| || [ ! -d /etc/ipsec.d ]; then | |
| exiterr "Libreswan $SWAN_VER failed to build." | |
| fi | |
| fi | |
| } | |
| create_vpn_config() { | |
| bigecho "Creating VPN configuration..." | |
| L2TP_NET=${VPN_L2TP_NET:-'192.168.42.0/24'} | |
| L2TP_LOCAL=${VPN_L2TP_LOCAL:-'192.168.42.1'} | |
| L2TP_POOL=${VPN_L2TP_POOL:-'192.168.42.10-192.168.42.250'} | |
| XAUTH_NET=${VPN_XAUTH_NET:-'192.168.43.0/24'} | |
| XAUTH_POOL=${VPN_XAUTH_POOL:-'192.168.43.10-192.168.43.250'} | |
| DNS_SRV1=${VPN_DNS_SRV1:-'8.8.8.8'} | |
| DNS_SRV2=${VPN_DNS_SRV2:-'8.8.4.4'} | |
| DNS_SRVS="\"$DNS_SRV1 $DNS_SRV2\"" | |
| [ -n "$VPN_DNS_SRV1" ] && [ -z "$VPN_DNS_SRV2" ] && DNS_SRVS="$DNS_SRV1" | |
| # Create IPsec config | |
| conf_bk "/etc/ipsec.conf" | |
| cat > /etc/ipsec.conf <<EOF | |
| version 2.0 | |
| config setup | |
| ikev1-policy=accept | |
| virtual-private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:!$L2TP_NET,%v4:!$XAUTH_NET | |
| uniqueids=no | |
| conn shared | |
| left=%defaultroute | |
| leftid=$public_ip | |
| right=%any | |
| encapsulation=yes | |
| authby=secret | |
| pfs=no | |
| rekey=no | |
| dpddelay=30 | |
| dpdtimeout=300 | |
| ikev2=never | |
| ike=aes256-sha2;modp2048,aes128-sha2;modp2048,aes256-sha1;modp2048,aes128-sha1;modp2048 | |
| phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2 | |
| ikelifetime=24h | |
| salifetime=24h | |
| sha2-truncbug=no | |
| conn l2tp-psk | |
| auto=add | |
| leftprotoport=17/1701 | |
| rightprotoport=17/%any | |
| type=transport | |
| also=shared | |
| conn xauth-psk | |
| auto=add | |
| leftsubnet=0.0.0.0/0 | |
| rightaddresspool=$XAUTH_POOL | |
| modecfgdns=$DNS_SRVS | |
| leftxauthserver=yes | |
| rightxauthclient=yes | |
| leftmodecfgserver=yes | |
| rightmodecfgclient=yes | |
| modecfgpull=yes | |
| cisco-unity=yes | |
| also=shared | |
| include /etc/ipsec.d/*.conf | |
| EOF | |
| # Specify IPsec PSK | |
| conf_bk "/etc/ipsec.secrets" | |
| cat > /etc/ipsec.secrets <<EOF | |
| %any %any : PSK "$VPN_IPSEC_PSK" | |
| EOF | |
| # Create xl2tpd config | |
| conf_bk "/etc/xl2tpd/xl2tpd.conf" | |
| cat > /etc/xl2tpd/xl2tpd.conf <<EOF | |
| [global] | |
| port = 1701 | |
| [lns default] | |
| ip range = $L2TP_POOL | |
| local ip = $L2TP_LOCAL | |
| require chap = yes | |
| refuse pap = yes | |
| require authentication = yes | |
| name = l2tpd | |
| pppoptfile = /etc/ppp/options.xl2tpd | |
| length bit = yes | |
| EOF | |
| # Set xl2tpd options | |
| conf_bk "/etc/ppp/options.xl2tpd" | |
| cat > /etc/ppp/options.xl2tpd <<EOF | |
| +mschap-v2 | |
| ipcp-accept-local | |
| ipcp-accept-remote | |
| noccp | |
| auth | |
| mtu 1280 | |
| mru 1280 | |
| proxyarp | |
| lcp-echo-failure 4 | |
| lcp-echo-interval 30 | |
| connect-delay 5000 | |
| ms-dns $DNS_SRV1 | |
| EOF | |
| if [ -z "$VPN_DNS_SRV1" ] || [ -n "$VPN_DNS_SRV2" ]; then | |
| cat >> /etc/ppp/options.xl2tpd <<EOF | |
| ms-dns $DNS_SRV2 | |
| EOF | |
| fi | |
| # Create VPN credentials | |
| conf_bk "/etc/ppp/chap-secrets" | |
| cat > /etc/ppp/chap-secrets <<EOF | |
| "$VPN_USER" l2tpd "$VPN_PASSWORD" * | |
| EOF | |
| conf_bk "/etc/ipsec.d/passwd" | |
| VPN_PASSWORD_ENC=$(openssl passwd -1 "$VPN_PASSWORD") | |
| cat > /etc/ipsec.d/passwd <<EOF | |
| $VPN_USER:$VPN_PASSWORD_ENC:xauth-psk | |
| EOF | |
| } | |
| update_sysctl() { | |
| bigecho "Updating sysctl settings..." | |
| if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf; then | |
| conf_bk "/etc/sysctl.conf" | |
| cat >> /etc/sysctl.conf <<EOF | |
| # Added by hwdsl2 VPN script | |
| kernel.msgmnb = 65536 | |
| kernel.msgmax = 65536 | |
| net.ipv4.ip_forward = 1 | |
| net.ipv4.conf.all.accept_redirects = 0 | |
| net.ipv4.conf.all.send_redirects = 0 | |
| net.ipv4.conf.all.rp_filter = 0 | |
| net.ipv4.conf.default.accept_redirects = 0 | |
| net.ipv4.conf.default.send_redirects = 0 | |
| net.ipv4.conf.default.rp_filter = 0 | |
| net.ipv4.conf.$NET_IFACE.send_redirects = 0 | |
| net.ipv4.conf.$NET_IFACE.rp_filter = 0 | |
| net.core.wmem_max = 16777216 | |
| net.core.rmem_max = 16777216 | |
| net.ipv4.tcp_rmem = 4096 87380 16777216 | |
| net.ipv4.tcp_wmem = 4096 87380 16777216 | |
| EOF | |
| if modprobe -q tcp_bbr \ | |
| && printf '%s\n%s' "4.20" "$(uname -r)" | sort -C -V \ | |
| && [ -f /proc/sys/net/ipv4/tcp_congestion_control ]; then | |
| cat >> /etc/sysctl.conf <<'EOF' | |
| net.core.default_qdisc = fq | |
| net.ipv4.tcp_congestion_control = bbr | |
| EOF | |
| fi | |
| fi | |
| } | |
| update_iptables() { | |
| bigecho "Updating IPTables rules..." | |
| IPT_FILE=/etc/sysconfig/iptables | |
| [ "$use_nft" = 1 ] && IPT_FILE=/etc/sysconfig/nftables.conf | |
| ipt_flag=0 | |
| if ! grep -qs "hwdsl2 VPN script" "$IPT_FILE"; then | |
| ipt_flag=1 | |
| fi | |
| ipi='iptables -I INPUT' | |
| ipf='iptables -I FORWARD' | |
| ipp='iptables -t nat -I POSTROUTING' | |
| res='RELATED,ESTABLISHED' | |
| nff='nft insert rule inet firewalld' | |
| nfn='nft insert rule inet nftables_svc' | |
| if [ "$ipt_flag" = 1 ]; then | |
| service fail2ban stop >/dev/null 2>&1 | |
| if [ "$use_nft" = 1 ]; then | |
| fd_conf=/etc/firewalld/firewalld.conf | |
| if grep -qs '^NftablesTableOwner=yes' "$fd_conf"; then | |
| sed -i '/NftablesTableOwner/s/yes/no/' "$fd_conf" | |
| firewall-cmd --reload >/dev/null 2>&1 | |
| fi | |
| nft list ruleset > "$IPT_FILE.old-$SYS_DT" | |
| chmod 600 "$IPT_FILE.old-$SYS_DT" | |
| else | |
| iptables-save > "$IPT_FILE.old-$SYS_DT" | |
| fi | |
| $ipi 1 -p udp --dport 1701 -m policy --dir in --pol none -j DROP | |
| $ipi 2 -m conntrack --ctstate INVALID -j DROP | |
| $ipi 3 -m conntrack --ctstate "$res" -j ACCEPT | |
| $ipi 4 -p udp -m multiport --dports 500,4500 -j ACCEPT | |
| $ipi 5 -p udp --dport 1701 -m policy --dir in --pol ipsec -j ACCEPT | |
| $ipi 6 -p udp --dport 1701 -j DROP | |
| $ipf 1 -m conntrack --ctstate INVALID -j DROP | |
| $ipf 2 -i "$NET_IFACE" -o ppp+ -m conntrack --ctstate "$res" -j ACCEPT | |
| $ipf 3 -i ppp+ -o "$NET_IFACE" -j ACCEPT | |
| $ipf 4 -i ppp+ -o ppp+ -j ACCEPT | |
| $ipf 5 -i "$NET_IFACE" -d "$XAUTH_NET" -m conntrack --ctstate "$res" -j ACCEPT | |
| $ipf 6 -s "$XAUTH_NET" -o "$NET_IFACE" -j ACCEPT | |
| $ipf 7 -s "$XAUTH_NET" -o ppp+ -j ACCEPT | |
| if [ "$use_nft" != 1 ]; then | |
| iptables -A FORWARD -j DROP | |
| fi | |
| if [ "$use_nft" = 1 ]; then | |
| $ipp -s "$XAUTH_NET" -o "$NET_IFACE" ! -d "$XAUTH_NET" -j MASQUERADE | |
| else | |
| $ipp -s "$XAUTH_NET" -o "$NET_IFACE" -m policy --dir out --pol none -j MASQUERADE | |
| fi | |
| $ipp -s "$L2TP_NET" -o "$NET_IFACE" -j MASQUERADE | |
| echo "# Modified by hwdsl2 VPN script" > "$IPT_FILE" | |
| if [ "$use_nft" = 1 ]; then | |
| for vport in 500 4500 1701; do | |
| $nff filter_INPUT udp dport "$vport" accept 2>/dev/null | |
| $nfn allow udp dport "$vport" accept 2>/dev/null | |
| done | |
| for vnet in "$L2TP_NET" "$XAUTH_NET"; do | |
| for vdir in saddr daddr; do | |
| $nff filter_FORWARD ip "$vdir" "$vnet" accept 2>/dev/null | |
| $nfn FORWARD ip "$vdir" "$vnet" accept 2>/dev/null | |
| done | |
| done | |
| echo "flush ruleset" >> "$IPT_FILE" | |
| nft list ruleset >> "$IPT_FILE" | |
| else | |
| iptables-save >> "$IPT_FILE" | |
| fi | |
| fi | |
| } | |
| fix_nss_config() { | |
| nss_conf="/etc/crypto-policies/back-ends/nss.config" | |
| if [ -s "$nss_conf" ]; then | |
| if ! grep -q ":SHA1:" "$nss_conf" \ | |
| && ! grep -q " allow=SHA1:" "$nss_conf"; then | |
| sed -i "/ALL allow=/s/ allow=/ allow=SHA1:/" "$nss_conf" | |
| fi | |
| fi | |
| } | |
| apply_gcp_mtu_fix() { | |
| if dmidecode -s system-product-name 2>/dev/null | grep -qi 'Google Compute Engine' \ | |
| && ifconfig 2>/dev/null | grep "$NET_IFACE" | head -n 1 | grep -qi 'mtu 1460'; then | |
| bigecho "Applying fix for MTU size..." | |
| ifconfig "$NET_IFACE" mtu 1500 | |
| dh_file="/etc/dhcp/dhclient.conf" | |
| if grep -qs "send host-name" "$dh_file" \ | |
| && ! grep -qs "interface-mtu 1500" "$dh_file"; then | |
| sed -i".old-$SYS_DT" \ | |
| "/send host-name/a \interface \"$NET_IFACE\" {\ndefault interface-mtu 1500;\nsupersede interface-mtu 1500;\n}" \ | |
| "$dh_file" | |
| fi | |
| fi | |
| } | |
| enable_on_boot() { | |
| bigecho "Enabling services on boot..." | |
| systemctl --now mask firewalld 2>/dev/null | |
| if [ "$use_nft" = 1 ]; then | |
| systemctl enable nftables 2>/dev/null | |
| systemctl enable fail2ban 2>/dev/null | |
| else | |
| systemctl enable iptables 2>/dev/null | |
| systemctl enable fail2ban 2>/dev/null | |
| fi | |
| if ! grep -qs "hwdsl2 VPN script" /etc/rc.local; then | |
| if [ -f /etc/rc.local ]; then | |
| conf_bk "/etc/rc.local" | |
| else | |
| echo '#!/bin/sh' > /etc/rc.local | |
| fi | |
| cat >> /etc/rc.local <<'EOF' | |
| # Added by hwdsl2 VPN script | |
| (sleep 15 | |
| service ipsec restart | |
| service xl2tpd restart | |
| echo 1 > /proc/sys/net/ipv4/ip_forward)& | |
| EOF | |
| fi | |
| } | |
| start_services() { | |
| bigecho "Starting services..." | |
| sysctl -e -q -p | |
| chmod +x /etc/rc.local | |
| chmod 600 /etc/ipsec.secrets* /etc/ppp/chap-secrets* /etc/ipsec.d/passwd* | |
| restorecon /etc/ipsec.d/*db 2>/dev/null | |
| restorecon /usr/local/sbin -Rv 2>/dev/null | |
| restorecon /usr/local/libexec/ipsec -Rv 2>/dev/null | |
| if [ "$use_nft" = 1 ]; then | |
| if ! nft -c -f "$IPT_FILE" >/dev/null 2>&1; then | |
| sed -i '/ip6 saddr fddd:\(2c4\|1194\):/s/xt target "MASQUERADE"/masquerade/' "$IPT_FILE" | |
| fi | |
| nft -f "$IPT_FILE" | |
| else | |
| iptables-restore < "$IPT_FILE" | |
| fi | |
| # Fix xl2tpd if l2tp_ppp is unavailable | |
| if ! modprobe -q l2tp_ppp; then | |
| sed -i '/^ExecStartPre=\//s/=/=-/' /usr/lib/systemd/system/xl2tpd.service | |
| systemctl daemon-reload | |
| fi | |
| mkdir -p /run/pluto | |
| service fail2ban restart 2>/dev/null | |
| service ipsec restart 2>/dev/null | |
| service xl2tpd restart 2>/dev/null | |
| } | |
| show_vpn_info() { | |
| cat <<EOF | |
| ================================================ | |
| IPsec VPN server is now ready for use! | |
| Connect to your new VPN with these details: | |
| Server IP: $public_ip | |
| IPsec PSK: $VPN_IPSEC_PSK | |
| Username: $VPN_USER | |
| Password: $VPN_PASSWORD | |
| Write these down. You'll need them to connect! | |
| VPN client setup: https://vpnsetup.net/clients | |
| ================================================ | |
| EOF | |
| } | |
| set_up_ikev2() { | |
| status=0 | |
| if [ -s /opt/src/ikev2.sh ] && [ ! -f /etc/ipsec.d/ikev2.conf ]; then | |
| skip_ikev2=0 | |
| case $VPN_SKIP_IKEV2 in | |
| [yY][eE][sS]) | |
| skip_ikev2=1 | |
| ;; | |
| esac | |
| if [ "$skip_ikev2" = 0 ]; then | |
| sleep 1 | |
| VPN_DNS_NAME="$VPN_DNS_NAME" VPN_PUBLIC_IP="$public_ip" \ | |
| VPN_CLIENT_NAME="$VPN_CLIENT_NAME" VPN_XAUTH_POOL="$VPN_XAUTH_POOL" \ | |
| VPN_DNS_SRV1="$VPN_DNS_SRV1" VPN_DNS_SRV2="$VPN_DNS_SRV2" \ | |
| VPN_PROTECT_CONFIG="$VPN_PROTECT_CONFIG" \ | |
| VPN_CLIENT_VALIDITY="$VPN_CLIENT_VALIDITY" \ | |
| /bin/bash /opt/src/ikev2.sh --auto || status=1 | |
| fi | |
| elif [ -s /opt/src/ikev2.sh ]; then | |
| cat <<'EOF' | |
| ================================================ | |
| IKEv2 is already set up on this server. | |
| Next steps: Configure IKEv2 clients. See: | |
| https://vpnsetup.net/clients | |
| To manage IKEv2 clients, run: sudo ikev2.sh | |
| ================================================ | |
| EOF | |
| fi | |
| } | |
| vpnsetup() { | |
| check_root | |
| check_vz | |
| check_lxc | |
| check_os | |
| check_iface | |
| check_creds | |
| check_dns | |
| check_server_dns | |
| check_client_name | |
| check_subnets | |
| check_libreswan | |
| start_setup | |
| install_setup_pkgs | |
| detect_ip | |
| add_epel_repo | |
| install_vpn_pkgs_1 | |
| install_vpn_pkgs_2 | |
| install_vpn_pkgs_3 | |
| install_fail2ban | |
| get_helper_scripts | |
| get_libreswan | |
| install_libreswan | |
| create_vpn_config | |
| update_sysctl | |
| update_iptables | |
| fix_nss_config | |
| apply_gcp_mtu_fix | |
| enable_on_boot | |
| start_services | |
| show_vpn_info | |
| set_up_ikev2 | |
| } | |
| ## Defer setup until we have the complete script | |
| vpnsetup "$@" | |
| exit "$status" |
how can i add another User Pass ?
i want 3 person can login to vpn with different user pass
how can i do?